Cloud computing trust-based security |
- Cloud computing trust-based security
- Here you have virus authors may be based in Spain
- New data security software from IBM
- How CIOs can get things done with their reduced staff
- HP to acquire ArcSight
- Browser protection against Web-borne threats
- Vulnerability assessment for databases
- Week in review: Inside a CERT, hotel systems breach and DHS network security holes
Cloud computing trust-based security Posted: 13 Sep 2010 10:14 AM PDT Trusted Computing Group, which develops industry standards for hardware-based security rooted in trust, announced an effort to extend the concept of trust to cloud-based computing. The effort will be ... |
Here you have virus authors may be based in Spain Posted: 13 Sep 2010 07:16 AM PDT The "Here you have" virus, which first appeared about a month ago, is a worm that has spread widely via email using social engineering (the name of the virus stems from the subject of the messages use... |
New data security software from IBM Posted: 13 Sep 2010 07:10 AM PDT Today, organizations are struggling to manage a variety of complex data security threats, from misuse by insiders or cyber criminals outside the company. Combined with an increase in corporate securit... |
How CIOs can get things done with their reduced staff Posted: 13 Sep 2010 05:36 AM PDT It seems to me that we're seeing more and more news of late about the lackluster job outlook. Unemployment will continue to be higher than originally forecasted and companies will remain hesitant to b... |
Posted: 13 Sep 2010 04:47 AM PDT HP and ArcSight have signed a definitive agreement for HP to acquire ArcSight, a security and compliance management company, for $43.50 per share, or an enterprise value of $1.5 billion. Together, ... |
Browser protection against Web-borne threats Posted: 13 Sep 2010 04:43 AM PDT Invincea Browser Protection safeguards enterprise PCs against all types of web-borne threats by moving web browsersthe entry point for most malwareinto a virtual environment in a manner that is tran... |
Vulnerability assessment for databases Posted: 13 Sep 2010 04:35 AM PDT Sentrigo announced a fully integrated database activity monitoring and vulnerability assessment solution for enterprises. Hedgehog Enterprise 4.0 provides a complete database activity monitoring and i... |
Week in review: Inside a CERT, hotel systems breach and DHS network security holes Posted: 13 Sep 2010 03:57 AM PDT Here's an overview of some of last week's most interesting news, articles and videos: Behind the scenes and inside workings of a CERT Brian Honan is the founder and head of Ireland's first Compu... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment